210 likes | 462 Views
Cyber-Physical Cloud(y) Computing: Good News, Bad News and Looking Forward. Haibo Chen. What is CPCC?. A cloudy definition by NIST of US
E N D
Cyber-Physical Cloud(y) Computing: Good News, Bad News and Looking Forward Haibo Chen
What is CPCC? A cloudy definition by NIST of US “a system environment that can rapidly build, modify and provision cyber-physical systems composed of a set of cloud computing based sensor, processing, control, and data services” -- A Vision of CyberPhysical Cloud Computingfor Smart Networked Systems, NIST Interagency/Internal Report (NISTIR) – 7951 CPCC, another buzzy word? a hype or a virtue?
A Picture on CPCC Source: Kyoung-sook Kim, JPGrid/Workshop38
Cloud-assisted Smarter Physical Wolds A good example of win-winsituation with feedback loops Cloud has abundant resources, essentially breaks resource scarcity of physical worlds Physical worlds help design better cloud, provide better services
PreCrime (APSys2014) Offloadthedetectionphasetocloud Reduceperformanceoverhead Flexiblyadding/adjustingdetectingpolicy Speculativeexecutiononestepahead Preventmaliciousbehaviorfromhappening Mitigatestateexplosion problem
CrowdAtlas (Mobisys’13, Wang et al.) Problem: Inaccuracy of manually created digital road maps Solution: CrowdAtlas, which automates map update based on people's travels (individually or crowdsourced) Using mobile navigation app detects significant portions of GPS traces that do not conform to the existing map http://grid.sjtu.edu.cn/mapupdate/
GeoFence (ACM SIGSPATIAL GIS Cup’13) Geo-fencing Advertisements Children location services … From xxx Sales!
Cyber Systems Meet Physical Worlds Unique Feature of Cyber Systems Remember “Worse is better design” slogan in computer systems design-Richard P. Gabriel Design systems almost work! “Unix and C are the ultimate computer viruses.” Traditional Physical systems Small, fixed functionality Carefully designed, modeled and/or verified Buckets effect of security Low security/reliability guarantees Cloud?
Can we believe in cloud? Inside Threats to Cloud Services • “invisibly access unencrypted data in its facility”- Gartner, 2008 Name: Haibo Salary: 100$ Creditcard: 8621 4579 … Name: Haibo Salary: 100$ Creditcard: 8621 4579 … Internet Haibo Control VM VM (with private data) Modified VM Control VM VMM VMM (malicious) Results Storage Is a rich guy? NO! Yes! YES! Cloud
Reason#1: curious or malicious operators ..., peeking in on emails, chats and Google Talk call logs for several months …
Reason#2: huge TCB for cloud 4.0 Control VM Tools Guest VM 3.0 Kernel 2.0 VMM Trusted Computing Base The TCB is growing to 9 Million LOCs by 2011 One point of penetration leads to full compromise 37 security issues are found in Xen and 53 in VMWareby Oct 2010. [CVE’12] The virtualization stack should be untrusted
Location Privacy Leaks How Cell Phone Helped Cops Nail Key Murder Suspect – Secret “Pings” that Gave Bouncer Away New York, NY, March 15, 2006 Stalker Victims Should Check For GPSMilwaukee, WI, February 6, 2003 Real time celebrity sightings http://www.gawker.com/stalker/ A Face Is Exposed for AOL Searcher No. 4417749 New York, NY, August 9, 2006
The Matrix Reloaded Image source: http://nextviewventures.com
Building Dependable CPCC Formal/code verification e.g., seL4: https://github.com/seL4 Well-defined boundary between cyber/physical worlds Building trusted systems from untrusted (cloud) services Fault Resistant Fault containment Redundancy
More Seamless Cyber/Physical Cloud How to seamless and cooperatively build both cyber and physical systems? New program models is needed! New systems software foundation e.g., HomeOS (NDSI’14), Building Operating System Services (NSDI’13) Tools for support building cyber/physical cloud
Thanks Questions CyberPhysical Cloud(y) Computing Institute of Parallel and Distributed Systems http://ipads.se.sjtu.edu.cn